Here is a very reputable source discussing the Facebook messenger privacy scandal... As I've previously stated, it has been blown way out of proportion and is safe to install.

Facebook Messenger has abundance of permissionsblog.malwarebytes.orgThis isn't the first time questions have risen about Facebook's long list of permissions. The question is whether this and similar apps really need all these permissions.

Here is how you can test if you are vulnerable from the latest bash bug:

Am I vulnerable? Edit for the time being: You are. No complete public fix has been posted yet, for the new CVE (CVE-2014-7169). The instructions I give below are only sufficient to close off part of the vulnerability.

There is an easy check. Open a terminal and paste the following:

env x='() { :;}; echo vulnerable' bash -c 'echo hello' It simply sets the environment variable called x to the value '() { :;}; echo vulnerable'. It then invokes bash asking it to echo back the word hello. The value of x that is set is a function definition that should do nothing. However, it is crafted to try to run 'echo vulnerable' at parsing of environment at bash start-up, which just prints vulnerable to standard out.

If you are not vulnerable, then the following will be shown:

bash: warning: x: ignoring function definition attempt bash: error importing function definition for `x' hello If you are vulnerable, then you will see:

vulnerable hello

Most likely you will be. In that case, a "yum update bash" should fix it. But I have been told that a reboot, after the update, is also be necessary...